BackTrack 4 Beta released

The Remote Exploit Development Team has just announced BackTrack 4 Beta. BackTrack is a Linux based LiveCD intended for security testing and we’ve been watching the project since the very early days. They say this new beta is both stable and usable. They’ve moved towards behaving like an actual distribution: it’s based on Debian core, they use Ubuntu software, and they’re running their own BackTrack repositories for future updates. There are a lot of new features, but the one we’re most interested in is the built in Pico card support. You can use the FPGAs to generate rainbow tables and do lookups for things like WPA, GSM, and Bluetooth cracking. BackTrack ISO and VMWare images are available here.

I’d stay away from the pb version. Who knows what was added to it. The only people who got it early were people at the con, well most of us there were hackers….. So if you use this version and your computer tries to hack teh gibson all by itself, don’t say you weren’t warned.

With regards to the bcm43xx, since BT2, It’s been all right with injection but it doesn’t always play ball. It does inject and you have to boot up with your wifi enabled (by ensuring you shut it down left on). With BT3, it was some what more stable. However, It stops injecting and changing mac etc.. so a reboot is in order.

If you want to do some wifi hacking, I
really encourage you to get a Ralink
or Atheros miniPCI card.
Otherwise, there are also some
el cheapo mini wifi routers (Fon) with
awesome Atheros chipsets that does the job.

Not really. Most clusters out there are
beowulf Linux. I must admit though that
there were a lot more some years ago.
The multicore battle changed all the game.

At the time I enjoyed a lot installing
OpenMOSIX Linux on all boxens of my
classroom. Too bad openmosix lost
interest on this days..

Anyway, backtrack provides some forensics
tools also, not just attack tools.
IMHO, this is a nice way to promote
Linux and some of their tools to
interested people. At least I like it a lot
to do Linux demonstrations at local schools.

@n00bhunter: Every robotic manufacturing cluster and embedded network I see in the states is mostly embedded xp on custom protocols. this is general motors newer manufacturing plants, almost all of the banking networks including atm machines.

I usually only see bsd and linux clusters in isps and research facilities along with public server solutions.

even on risc interfaces it’s usually embedded java or htc++ firmware or some sun microsystems solution. on rare occasions vms on various hardware too.

I’m in the places daily. Even the most most modern POS systems use a non-linux solution. This only leaves public servers and some other networks. BT4 isn’t really effective for reverse engineering Nt stuff. that’s why i say the wlan cracking, brute forcers, and protocol fuzzers are all it’s really good for from a professional stand point.

I’m having a problem with asus n10 notebook backtrack4 doesnt seem to be detecting the wireless. I was really hoping to have some fun with backtrack :(. Anybody have an idea how to fix this / install drivers?

I have been using bt3 for a while , but when i tried loading it to a pen drive , it is non-persistent. ie I am not able to save changes to my Pendrive , they are all lost after a reboot. Tried a lot of things on the forums , can somebody suggest me something.

hello all i am new to using backtrack so i want to
know wpa hack i need dictionary for livebox and tele2 what can i do is it in backtrack 4 or i have to download or i have to install or how to install plz plz any one can help me explan me how to install a good dictionary for wapa hack thanks a lot all of them to hear mi my mail address is sajidsajid71@hotmail.com mail mi plz

@Fox and anyone else asking for help;
Google Is Your Friend. Only Learn What You Need. Whack in
`/etc/init.d/network start` <– Somthing like that, its on the starting console.
and then `startx` Use Firefox and google it.

oh thanks for your help, but
I want someone teach me use it from zero.
I mean, I need a someone like a teacher.
Maybe I need some articel relationship with using that.
Please,send me at fox_the_stalker@yahoo.co.id

e-z way to crack wep …… idiot proof …
start bt…. once your in open console(little black box at the bottom left corner type..
op
“airmon-ng ”
see what the name of your interface is…
in my case it shows two wifi0 and ath0 the two are the same next type
“airmon-ng stop ath0”
so ath0 does not exist any more now we got to start a new one.type
“airmon-ng start wifi0”
great now you just put your card in monitor mode yay now we can find a network to crack
now type
“airodump-ng ath0”
you will get a list of networks and clients
find one with the wep encryption … (you need at least a signal strength of at least 10 …) k all you need is the bssid hit ctrl and X on your key board highlight it . right click copy note the channel it is on
go to the bottom left of the screen open the menu go to backtrack/radio…./802…./all plug your info in you don’t need a client … select the channel then injection to max
and find spoonwep open it and you will figure it out
anyoone feel free to correct me if im wrong